Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Presents an overview of wireless network security. This book examines wireless from multiple perspectives, including those... [more]
Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank... [more]
A guide to the CISSP-ISSEP CBK. It promotes understanding of the four ISSEP domains: Information Systems Security Engineering... [more]
Introduces the theory and algorithms involved in curve-based cryptography. This book provides ready-to-implement algorithms... [more]
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. Disruptive... [more]
Taking a process-focused approach, this book presents a methodology, an understanding of business goals and processes and... [more]
Presents an overview of information systems security, offering the basic underpinnings of information security and concluding... [more]
By allowing digital signatures to be as valid as handwritten signatures, public key infrastructure (PKI) provides businesses... [more]
Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping,... [more]
Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption... [more]
Integrates the importance of sound security policy with the strategic goals of an organization. This book offers an insight... [more]
Reveals those aspects of hacking least understood by network administrators. This handbook analyzes subjects through a hacking/security... [more]
Looks at steganography, a form of hidden communication from its beginnings to modern uses. This book provides insight into... [more]
Presents an overview of the elements that one needs to address to respond to network and information security violations.... [more]
Offers a formal framework for finding and eliminating network security threats. This title focuses on the steps necessary... [more]
Designed to be used by acquiring organizations, system integrators, manufacturers, and Common Criteria testing/certification... [more]
Offers a detailed treatment of public-key cryptography (PKC), from RSA, the first public key system devised in 1978, to the... [more]
Discusses successful approaches for the CISSP exam, provides sample questions and test-taking tips, and contains an annotated... [more]
Takes readers through developing, distributing, and monitoring an information security awareness program. This book includes... [more]
Offers an insight into the broader realm of information assurance (IA). This book explains real-world strategies applicable... [more]
Cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security.... [more]
Containing data on number theory, encryption schemes, and cyclic codes, this textbook presents coding theory, construction,... [more]
Presents an information on analyzing, designing, and implementing various aspects of computer network security. This book... [more]
Complete Study Essentials for the SSCP The SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide and... [more]
This handbook will assist cataloguers when creating metadata for sharing bibliographic records or digital collections on the... [more]